Author of the publication

Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation.

, , , and . IEA/AIE (3), volume 6098 of Lecture Notes in Computer Science, page 450-459. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reflections on Modelling Vagueness in Description Logics., , , , , and . URSW, volume 218 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)Strategies for Incorporating Knowledge Defects and Path Length in Trust Aggregation., , , and . IEA/AIE (3), volume 6098 of Lecture Notes in Computer Science, page 450-459. Springer, (2010)Towards a Provenance-Preserving Trust Model in Agent Networks., , , and . MTW, volume 190 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items., , , and . ICWSM, The AAAI Press, (2009)Trust networks for recommender systems.. Ghent University, Belgium, (2010)base-search.net (ftunivgent:oai:archive.ugent.be:986279).Trust- and Distrust-Based Recommendations for Controversial Reviews., , , and . IEEE Intelligent Systems, 26 (1): 48-55 (2011)Key figure impact in trust-enhanced recommender systems., , , and . AI Commun., 21 (2-3): 127-143 (2008)Whom should I trust?: the impact of key figures on cold start recommendations., , , and . SAC, page 2014-2018. ACM, (2008)Enhanced Recommendations through Propagation of Trust and Distrust., , and . IAT Workshops, page 263-266. IEEE Computer Society, (2006)